IBM WebSphere Application Server 6.1 < Multiple Vulnerabilities

Medium Nessus Plugin ID 55649


The remote application server is affected by multiple vulnerabilities.


IBM WebSphere Application Server 6.1 before Fix Pack 39 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :

- Use of an insecure XML encryption algorithm could allow for decryption of JAX-RPC or JAX-WS Web Services requests. (PM34841)

- An error exists in the validation of the 'logoutExitPage' parameter that can allow a remote attacker to bypass security restrictions and redirect users in support of a phishing attack. (PM35701)

- An error exists in the handling of administration console requests. This error can allow a local attacker to use a specially crafted request to view sensitive stack-trace information. (PM36620)


If using WebSphere Application Server, apply Fix Pack 39 ( or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

Plugin Details

Severity: Medium

ID: 55649

File Name: websphere_6_1_0_39.nasl

Version: $Revision: 1.5 $

Type: remote

Family: Web Servers

Published: 2011/07/22

Modified: 2013/02/22

Dependencies: 57034

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/07/18

Vulnerability Publication Date: 2011/04/04

Reference Information

CVE: CVE-2011-1209, CVE-2011-1355, CVE-2011-1356

BID: 47831, 48709, 48710

OSVDB: 73289, 73898, 73903